会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Computer file system
    • 电脑文件系统
    • US20060106841A1
    • 2006-05-18
    • US10985907
    • 2004-11-12
    • Andrew BybeeAnil NoriBalan RamanTimothy McKeeWalter Smith
    • Andrew BybeeAnil NoriBalan RamanTimothy McKeeWalter Smith
    • G06F7/00
    • G06F17/30091
    • A file system that does not conflate item lifetime with the item's inclusion in an organizational structure of the file system is described herein. In addition, the file system's organizational structure is not limited to directory trees, but instead may use any directed acyclic graph (DAG). Items, once stored into the file system, may be maintained until affirmatively deleted by a client of the file system, regardless of whether the item is part of a DAG or not. Items may be placed in file regions, which are conceptual workspaces for a client to control item lifetime and to organize items into any DAG structure of the user's choosing. Items may be concurrently stored in multiple DAGs, and each file region may have one or more independent DAGs. An item's placement in a DAG may also be used to govern file properties such as namespace, security, privacy, and read/write attributes.
    • 这里描述了不将项目生命周期与项目包含在文件系统的组织结构中的文件系统。 此外,文件系统的组织结构不限于目录树,而是可以使用任何有向无环图(DAG)。 一旦存储到文件系统中的项目可以被维护,直到由文件系统的客户端肯定地删除,而不管该项目是否是DAG的一部分。 项目可以放置在文件区域中,这些是客户端的概念工作区域,用于控制项目生命周期,并将项目组织到用户选择的任何DAG结构中。 项目可以同时存储在多个DAG中,并且每个文件区域可以具有一个或多个独立的DAG。 项目在DAG中的放置也可用于管理文件属性,例如命名空间,安全性,隐私和读/写属性。
    • 3. 发明申请
    • Database fragment cloning and management
    • 数据库片段克隆和管理
    • US20070043749A1
    • 2007-02-22
    • US11207482
    • 2005-08-19
    • Robert GerberBalan RamanJames HamiltonJohn LudemanMurali KrishnaSamuel SmithShrinivas Ashwin
    • Robert GerberBalan RamanJames HamiltonJohn LudemanMurali KrishnaSamuel SmithShrinivas Ashwin
    • G06F7/00
    • G06F17/30362G06F11/2094G06F11/2097G06F2201/80
    • Mechanisms and techniques for database fragment cloning and management are provided. A database object, such as a table, rowset or index, is divided into fragments. Each fragment is cloned to create cloned fragments, which operationally are substantially identical to one another. One or more of the cloned fragments may be designated as a primary cloned fragment for performing database operations or as a secondary cloned fragment for serving as backup. Updates to each fragment are implemented on the primary cloned fragment and are then propagated from the primary cloned fragment to the corresponding secondary cloned fragments. A cloned fragment can go offline, becoming unavailable to be updated. When the cloned fragment returns online, the cloned fragment is refreshed with data included in the primary cloned fragment. While being refreshed, the cloned fragment may continue to be updated. The cloned fragment is eligible to be designated as a primary cloned fragment when the refreshing process has been completed.
    • 提供了数据库片段克隆和管理的机制和技术。 数据库对象(如表,行集或索引)被划分成片段。 克隆每个片段以产生克隆的片段,其在操作上基本上彼此相同。 可以将一个或多个克隆的片段指定为用于执行数据库操作的主要克隆片段或用作备份的辅助克隆片段。 对每个片段的更新在主要克隆片段上实现,然后从主要克隆片段扩增到相应的次级克隆片段。 克隆的片段可以脱机,不可更新。 当克隆片段返回联机时,克隆片段将使用包含在主克隆片段中的数据进行刷新。 刷新时,克隆片段可能会继续更新。 当刷新过程完成时,克隆片段有资格被指定为主要的克隆片段。
    • 5. 发明申请
    • System and method for storing and retrieving a field of a user defined type outside of a database store in which the type is defined
    • 用于存储和检索在定义类型的数据库存储之外的用户定义类型的字段的系统和方法
    • US20050203950A1
    • 2005-09-15
    • US11121882
    • 2005-05-04
    • Rajeev RajanBalan RamanKangrong Yan
    • Rajeev RajanBalan RamanKangrong Yan
    • G06F7/00G06F17/00G06F17/30
    • G06F17/30286G06F17/30607Y10S707/99932Y10S707/99934Y10S707/99939Y10S707/99943Y10S707/99944Y10S707/99953
    • A type of an object that can be persisted in a database store is defined by a user. The type definition comprises fields and behaviors, each field having a respective data type. One or more fields of the type definition may be designated as containing data of a type that is to be stored as a file outside of the database store and separately from the other fields of the type definition. When a request is received to store an object that is an instance of the user defined type, the data in any so designated field of the object is stored in a file outside of the database store, preferably within a file system of the computer on which the database store is implemented. The data in each of the other fields of the object is stored within the database store in the usual manner. The database store maintains a link, or reference, between the persisted object and the data of the field that is stored as a file outside of the database store. Applications are provided “out of band” access, via the file system of the computer, to the file in which the data of given field is stored outside the database store.
    • 可以在数据库存储中保存的对象的类型由用户定义。 类型定义包括字段和行为,每个字段具有相应的数据类型。 类型定义的一个或多个字段可以被指定为包含要作为数据库存储之外的文件存储的类型的数据,并且与类型定义的其他字段分开。 当接收到用于存储作为用户定义类型的实例的对象的请求时,对象的任何这样指定的字段中的数据被存储在数据库存储之外的文件中,优选地在计算机的文件系统内 实现数据库存储。 对象的每个其他字段中的数据以通常的方式存储在数据库存储中。 数据库存储在持久对象和作为数据库存储之外的文件存储的字段的数据之间维护一个链接或引用。 通过计算机的文件系统将应用程序“带外”访问提供给数据库存储之外的给定字段数据的文件。
    • 9. 发明申请
    • Zoned based security administration for data items
    • 数据项的分区式安全管理
    • US20050039001A1
    • 2005-02-17
    • US10630162
    • 2003-07-30
    • Irena HudisLev NovikSanjay AnandSameet AgarwalBalan Raman
    • Irena HudisLev NovikSanjay AnandSameet AgarwalBalan Raman
    • G06F21/24G06F12/00G06F12/14G06F15/00G06F21/00G06F21/20H04L9/00
    • G06F21/6218G06F2221/2141G06F2221/2145
    • Administering digital security is disclosed. Data and method items are stored on a computer system in a volume. The volume is divided up into non-overlapping security zones. Each item exists in a security zone. Security rules are granted to principals where the security rules apply to items in a particular zone. The security rules specify what principals have what rights; such as read, write delete and execute; to what items. Administrative rights can be delegated by principals by splitting a security zone to form two security zones. Principals who have administrative rights to the security zone assign additional principals to one of the security zones while maintaining all administrative rights to the other zone. Thus principals can retain certain administrative rights to certain items exclusively to themselves while delegating administrative rights to other items to other principals.
    • 公开了管理数字安全。 数据和方法项目存储在卷中的计算机系统上。 音量分为不重叠的安全区域。 每个项目都存在于安全区域中。 安全规则被授予主体,其中安全规则适用于特定区域中的项目。 安全规则规定什么校长有什么权利? 如读,写删除和执行; 到什么物品 主管人员可以通过拆分安全区域形成两个安全区域来管理权限。 拥有对安全区域具有管理权限的校长将向其中一个安全区域分配其他校长,同时维护对另一个区域的所有管理权限。 因此,负责人可以将某些项目的某些行政权利保留给自己,同时将其他项目的行政权力委托给其他负责人。